Analysis
-
max time kernel
141s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:41
Static task
static1
Behavioral task
behavioral1
Sample
PAUL DETAIL's..exe
Resource
win7-20220812-en
General
-
Target
PAUL DETAIL's..exe
-
Size
817KB
-
MD5
c5d2095e8e1f8e9af9fd19ba2c885de4
-
SHA1
db7c115bec56a8a3672d32896db2375af842ddee
-
SHA256
2e4663d20f62d72f1ffd25ada448dc25fba8681ad0755fdd0451f460b2dc570c
-
SHA512
74ac28f939655b85dcf14d56df23942bee8c60a485aee361e5ebf64ffd53bb69e8b27106d7512d54130622325ab00dd917d04a9b729cfd9ddede5b8d2ecc5c66
-
SSDEEP
6144:SqyVDmmHOegxgaoJ6rVyFHp9pK3HseCSamdVFWGmOWCouHohuC9OJ+F8Y/WGMXEg:IMMO70JMmremUVF3pWfYJMlTLGdGtF
Malware Config
Extracted
darkcloud
- email_from
- email_to
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
sideris cyt 2.exesideris cyt 2.exesideris cyt 2.exepid process 1188 sideris cyt 2.exe 1800 sideris cyt 2.exe 1984 sideris cyt 2.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
PAUL DETAIL's..exesideris cyt 2.exedescription pid process target process PID 1500 set thread context of 2024 1500 PAUL DETAIL's..exe PAUL DETAIL's..exe PID 1188 set thread context of 1800 1188 sideris cyt 2.exe sideris cyt 2.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
PAUL DETAIL's..exepid process 2024 PAUL DETAIL's..exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
PAUL DETAIL's..exesideris cyt 2.exepid process 2024 PAUL DETAIL's..exe 1800 sideris cyt 2.exe -
Suspicious use of WriteProcessMemory 58 IoCs
Processes:
PAUL DETAIL's..execmd.exetaskeng.exesideris cyt 2.execmd.exedescription pid process target process PID 1500 wrote to memory of 2024 1500 PAUL DETAIL's..exe PAUL DETAIL's..exe PID 1500 wrote to memory of 2024 1500 PAUL DETAIL's..exe PAUL DETAIL's..exe PID 1500 wrote to memory of 2024 1500 PAUL DETAIL's..exe PAUL DETAIL's..exe PID 1500 wrote to memory of 2024 1500 PAUL DETAIL's..exe PAUL DETAIL's..exe PID 1500 wrote to memory of 2024 1500 PAUL DETAIL's..exe PAUL DETAIL's..exe PID 1500 wrote to memory of 2024 1500 PAUL DETAIL's..exe PAUL DETAIL's..exe PID 1500 wrote to memory of 2024 1500 PAUL DETAIL's..exe PAUL DETAIL's..exe PID 1500 wrote to memory of 2024 1500 PAUL DETAIL's..exe PAUL DETAIL's..exe PID 1500 wrote to memory of 2024 1500 PAUL DETAIL's..exe PAUL DETAIL's..exe PID 1500 wrote to memory of 1776 1500 PAUL DETAIL's..exe cmd.exe PID 1500 wrote to memory of 1776 1500 PAUL DETAIL's..exe cmd.exe PID 1500 wrote to memory of 1776 1500 PAUL DETAIL's..exe cmd.exe PID 1500 wrote to memory of 1776 1500 PAUL DETAIL's..exe cmd.exe PID 1500 wrote to memory of 1060 1500 PAUL DETAIL's..exe cmd.exe PID 1500 wrote to memory of 1060 1500 PAUL DETAIL's..exe cmd.exe PID 1500 wrote to memory of 1060 1500 PAUL DETAIL's..exe cmd.exe PID 1500 wrote to memory of 1060 1500 PAUL DETAIL's..exe cmd.exe PID 1500 wrote to memory of 1104 1500 PAUL DETAIL's..exe cmd.exe PID 1500 wrote to memory of 1104 1500 PAUL DETAIL's..exe cmd.exe PID 1500 wrote to memory of 1104 1500 PAUL DETAIL's..exe cmd.exe PID 1500 wrote to memory of 1104 1500 PAUL DETAIL's..exe cmd.exe PID 1060 wrote to memory of 812 1060 cmd.exe schtasks.exe PID 1060 wrote to memory of 812 1060 cmd.exe schtasks.exe PID 1060 wrote to memory of 812 1060 cmd.exe schtasks.exe PID 1060 wrote to memory of 812 1060 cmd.exe schtasks.exe PID 968 wrote to memory of 1188 968 taskeng.exe sideris cyt 2.exe PID 968 wrote to memory of 1188 968 taskeng.exe sideris cyt 2.exe PID 968 wrote to memory of 1188 968 taskeng.exe sideris cyt 2.exe PID 968 wrote to memory of 1188 968 taskeng.exe sideris cyt 2.exe PID 1188 wrote to memory of 1800 1188 sideris cyt 2.exe sideris cyt 2.exe PID 1188 wrote to memory of 1800 1188 sideris cyt 2.exe sideris cyt 2.exe PID 1188 wrote to memory of 1800 1188 sideris cyt 2.exe sideris cyt 2.exe PID 1188 wrote to memory of 1800 1188 sideris cyt 2.exe sideris cyt 2.exe PID 1188 wrote to memory of 1800 1188 sideris cyt 2.exe sideris cyt 2.exe PID 1188 wrote to memory of 1800 1188 sideris cyt 2.exe sideris cyt 2.exe PID 1188 wrote to memory of 1800 1188 sideris cyt 2.exe sideris cyt 2.exe PID 1188 wrote to memory of 1800 1188 sideris cyt 2.exe sideris cyt 2.exe PID 1188 wrote to memory of 1800 1188 sideris cyt 2.exe sideris cyt 2.exe PID 1188 wrote to memory of 1808 1188 sideris cyt 2.exe cmd.exe PID 1188 wrote to memory of 1808 1188 sideris cyt 2.exe cmd.exe PID 1188 wrote to memory of 1808 1188 sideris cyt 2.exe cmd.exe PID 1188 wrote to memory of 1808 1188 sideris cyt 2.exe cmd.exe PID 1188 wrote to memory of 1280 1188 sideris cyt 2.exe cmd.exe PID 1188 wrote to memory of 1280 1188 sideris cyt 2.exe cmd.exe PID 1188 wrote to memory of 1280 1188 sideris cyt 2.exe cmd.exe PID 1188 wrote to memory of 1280 1188 sideris cyt 2.exe cmd.exe PID 1280 wrote to memory of 676 1280 cmd.exe schtasks.exe PID 1280 wrote to memory of 676 1280 cmd.exe schtasks.exe PID 1280 wrote to memory of 676 1280 cmd.exe schtasks.exe PID 1280 wrote to memory of 676 1280 cmd.exe schtasks.exe PID 1188 wrote to memory of 1380 1188 sideris cyt 2.exe cmd.exe PID 1188 wrote to memory of 1380 1188 sideris cyt 2.exe cmd.exe PID 1188 wrote to memory of 1380 1188 sideris cyt 2.exe cmd.exe PID 1188 wrote to memory of 1380 1188 sideris cyt 2.exe cmd.exe PID 968 wrote to memory of 1984 968 taskeng.exe sideris cyt 2.exe PID 968 wrote to memory of 1984 968 taskeng.exe sideris cyt 2.exe PID 968 wrote to memory of 1984 968 taskeng.exe sideris cyt 2.exe PID 968 wrote to memory of 1984 968 taskeng.exe sideris cyt 2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PAUL DETAIL's..exe"C:\Users\Admin\AppData\Local\Temp\PAUL DETAIL's..exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\PAUL DETAIL's..exe"C:\Users\Admin\AppData\Local\Temp\PAUL DETAIL's..exe"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\sideris cyt 2"2⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\sideris cyt 2\sideris cyt 2.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\sideris cyt 2\sideris cyt 2.exe'" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\PAUL DETAIL's..exe" "C:\Users\Admin\AppData\Roaming\sideris cyt 2\sideris cyt 2.exe"2⤵
-
C:\Windows\system32\taskeng.exetaskeng.exe {9645110F-32C6-4B95-9F83-D86E7F252037} S-1-5-21-3845472200-3839195424-595303356-1000:ZERMMMDR\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\sideris cyt 2\sideris cyt 2.exe"C:\Users\Admin\AppData\Roaming\sideris cyt 2\sideris cyt 2.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\sideris cyt 2\sideris cyt 2.exe"C:\Users\Admin\AppData\Roaming\sideris cyt 2\sideris cyt 2.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\sideris cyt 2"3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\sideris cyt 2\sideris cyt 2.exe'" /f3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\sideris cyt 2\sideris cyt 2.exe'" /f4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\sideris cyt 2\sideris cyt 2.exe" "C:\Users\Admin\AppData\Roaming\sideris cyt 2\sideris cyt 2.exe"3⤵
-
C:\Users\Admin\AppData\Roaming\sideris cyt 2\sideris cyt 2.exe"C:\Users\Admin\AppData\Roaming\sideris cyt 2\sideris cyt 2.exe"2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\sideris cyt 2\sideris cyt 2.exeFilesize
817KB
MD5c5d2095e8e1f8e9af9fd19ba2c885de4
SHA1db7c115bec56a8a3672d32896db2375af842ddee
SHA2562e4663d20f62d72f1ffd25ada448dc25fba8681ad0755fdd0451f460b2dc570c
SHA51274ac28f939655b85dcf14d56df23942bee8c60a485aee361e5ebf64ffd53bb69e8b27106d7512d54130622325ab00dd917d04a9b729cfd9ddede5b8d2ecc5c66
-
C:\Users\Admin\AppData\Roaming\sideris cyt 2\sideris cyt 2.exeFilesize
817KB
MD5c5d2095e8e1f8e9af9fd19ba2c885de4
SHA1db7c115bec56a8a3672d32896db2375af842ddee
SHA2562e4663d20f62d72f1ffd25ada448dc25fba8681ad0755fdd0451f460b2dc570c
SHA51274ac28f939655b85dcf14d56df23942bee8c60a485aee361e5ebf64ffd53bb69e8b27106d7512d54130622325ab00dd917d04a9b729cfd9ddede5b8d2ecc5c66
-
C:\Users\Admin\AppData\Roaming\sideris cyt 2\sideris cyt 2.exeFilesize
817KB
MD5c5d2095e8e1f8e9af9fd19ba2c885de4
SHA1db7c115bec56a8a3672d32896db2375af842ddee
SHA2562e4663d20f62d72f1ffd25ada448dc25fba8681ad0755fdd0451f460b2dc570c
SHA51274ac28f939655b85dcf14d56df23942bee8c60a485aee361e5ebf64ffd53bb69e8b27106d7512d54130622325ab00dd917d04a9b729cfd9ddede5b8d2ecc5c66
-
C:\Users\Admin\AppData\Roaming\sideris cyt 2\sideris cyt 2.exeFilesize
817KB
MD5c5d2095e8e1f8e9af9fd19ba2c885de4
SHA1db7c115bec56a8a3672d32896db2375af842ddee
SHA2562e4663d20f62d72f1ffd25ada448dc25fba8681ad0755fdd0451f460b2dc570c
SHA51274ac28f939655b85dcf14d56df23942bee8c60a485aee361e5ebf64ffd53bb69e8b27106d7512d54130622325ab00dd917d04a9b729cfd9ddede5b8d2ecc5c66
-
memory/676-94-0x0000000000000000-mapping.dmp
-
memory/812-71-0x0000000000000000-mapping.dmp
-
memory/1060-69-0x0000000000000000-mapping.dmp
-
memory/1104-70-0x0000000000000000-mapping.dmp
-
memory/1188-76-0x00000000010B0000-0x0000000001182000-memory.dmpFilesize
840KB
-
memory/1188-74-0x0000000000000000-mapping.dmp
-
memory/1280-89-0x0000000000000000-mapping.dmp
-
memory/1380-95-0x0000000000000000-mapping.dmp
-
memory/1500-55-0x0000000076201000-0x0000000076203000-memory.dmpFilesize
8KB
-
memory/1500-54-0x00000000012E0000-0x00000000013B2000-memory.dmpFilesize
840KB
-
memory/1776-68-0x0000000000000000-mapping.dmp
-
memory/1800-86-0x000000000040312C-mapping.dmp
-
memory/1800-97-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/1800-96-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/1808-87-0x0000000000000000-mapping.dmp
-
memory/1984-98-0x0000000000000000-mapping.dmp
-
memory/1984-100-0x00000000010B0000-0x0000000001182000-memory.dmpFilesize
840KB
-
memory/2024-77-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/2024-57-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/2024-59-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/2024-56-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/2024-62-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/2024-63-0x000000000040312C-mapping.dmp
-
memory/2024-65-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/2024-72-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB